A Model of Methods Access Authorization in Object-oriented Databases

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    14 Scopus citations

    Abstract

    Object-oriented databases are a recent and important development and many studies of them have been performed. These consider aspects such as data modeling, query languages, performance, and concurrency control. Relatively few studies address their security, a critical aspect in systems like these that have a complex and rich data structuring. We developed previously a model of authorization for object-oriented databases which includes a set of policies, a structure for authorization rules and their administration, and evaluation algorithms. In that model the high-level query requests were resolved into read and writes at the authorization level. In this paper we extend the set of access primitives to include ways to control the execution of methods or functions. Policy issues are discussed first, and then algorithms for access evaluation at compile-time and at run-time.

    Original languageEnglish
    Title of host publicationVLDB 1993 - Proceedings of the 19th International Conference on Very Large Data Bases
    EditorsRakesh Agrawal, Sean Baker, David A. Bell
    PublisherMorgan Kaufmann Publishers, Inc.
    Pages52-61
    Number of pages10
    ISBN (Electronic)155860152X, 9781558601529
    StatePublished - 1 Jan 1993
    Event19th International Conference on Very Large Data Bases, VLDB 1993 - Dublin, Ireland
    Duration: 24 Aug 199327 Aug 1993

    Publication series

    NameVLDB 1993 - Proceedings of the 19th International Conference on Very Large Data Bases

    Conference

    Conference19th International Conference on Very Large Data Bases, VLDB 1993
    Country/TerritoryIreland
    CityDublin
    Period24/08/9327/08/93

    Keywords

    • Database Security
    • Methods
    • Object-oriented Security
    • Object-oriented Systems

    ASJC Scopus subject areas

    • Hardware and Architecture
    • Information Systems
    • Software
    • Information Systems and Management

    Fingerprint

    Dive into the research topics of 'A Model of Methods Access Authorization in Object-oriented Databases'. Together they form a unique fingerprint.

    Cite this